Last week, Thomas Wright, an expert on U.S. foreign policy at the Brookings Institution, made a boldclaim on Twitter about the presidential race in the United States. “Pretty clear this is the most important election anywhere in the world since the two German elections of 1932,” he wrote, in reference to the parliamentary elections that ultimately resulted in Adolf Hitler coming to power. “No other election has had the capacity to completely overturn the international order—the global economy, geopolitics, etc.”

Throughout this campaign, as others have dismissed Donald Trump’s foreign-policy views as incoherent and ill-informed, Wright has taken those views seriously and sought to place them in an ideological and historical context. He’s carefully separated Trump’s bluster (“Obama founded ISIS”) from what appear to be Trump’s core beliefs. Sifting through Trump’s public statements about international affairs since the 1980s, Wright has concluded that the Republican candidate actually has a consistent worldview unlike anything expressed by a major-party U.S. presidential nominee since America became a superpower.

Trump’s isolationist ideology has three components, according to Wright: 1) opposition to U.S. alliances; 2) opposition to free trade; and 3) support for authoritarianism...

The New York Times and other national media sources are reporting that late Sunday night, the FBI obtained a search warrant to examine email messages belonging to top Clinton aide Huma Abedin. The messages were stored on a laptop belonging to her estranged husband, Anthony Weiner. The laptop was seized by the agency in connection with an investigation into Weiner’s alleged sexting with a 15-year-old North Carolina girl.

The emails are clearly Abedin’s property, even if they were backed up on her husband’s computer. (If they jointly owned the computer, her ownership would be even clearer.) Under the federal rules of criminal procedure, the owner of property seized under a search warrant must be given a copy of the warrant and an inventory of what was taken. Has she received a copy or an inventory?

In this unpredictable campaign season, it’s hard to foresee what Election Day 2016 itself will look like. But many signs are worrying. The Republican nominee has essentially called for voter intimidation, and his supporters are taking up arms. Violence at the voting booth is a real possibility. Thousands of voters are likely to be misinformed about where and how to vote. In some areas they may find out their right to cast a ballot challenged. And if that wasn’t enough, multiple hacks throughout the campaign season indicate that foreign actors may add to the chaos.

Of course, these concerns are not new. Political players have always strived to keep those whom they did not want voting at home, and these efforts have always been thinly veiled. But the extent of voter intimidation tactics discussed by a number of fringe groups and the formal efforts to suppress the minority vote are reminiscent of an entirely different time in American history.

Voter intimidation

Trump’s favorite refrain during the last months of the campaign season has been that the election is “rigged” against him. In his particularly coded language he has called on his supporters to monitor polling locations in...

“I met with Eric Schmidt tonight,” John Podesta, the longtime Hillary Clinton adviser, told campaign manager-in-waiting Robby Mook in April 2014, more than a year before Clinton announced her candidacy for president.

“He’s ready to fund, advise recruit talent, etc. He was more deferential on structure than I expected. Wasn’t pushing to run through one of his existing firms. Clearly wants to be head outside advisor, but didn’t seem like he wanted to push others out. Clearly wants to get going. He’s still in DC tomorrow and would like to meet with you if you are in DC in the afternoon. I think it’s worth doing.”

What did the meeting lead to? As of this week, Schmidt hasn’t bothered to donate a cent directly to Clinton’s campaign. Instead, he has leveraged his Silicon Valley acumen to generate a new source of influence.

Start-ups for Hillary

Schmidt donated $5,000 to Barack Obama’s 2012 campaign and advised it on digital operations; afterward, he invested in several start-ups founded...

The FBI has announced that it is investigating newly discovered messages related to Hillary Clinton’s use of a private email server. According to The New York Times, these emails were found in the course of the agency’s investigation of the former New York Congressman Anthony Weiner and the longtime Clinton aide Huma Abedin.

With just 11 days to go until November 8, FBI Director James Comey’s decision to disclose the investigation could affect the election. The timing raises two important questions: What was his legal obligation to provide the public with information on this investigation, if any, and what could happen to him as a result of his choice?

It’s possible Comey was partly motivated by fear. When he chose not to prosecute Clinton for her use of a private email server, he was brought before Congress to defend his decision; a hearing at the House Judiciary Committee in September lasted nearly four hours. If he failed to amend his testimony and inform Congress about new evidence potentially relevant to that case, he would almost certainly face more hearings—particularly if the agency discovered information about Clinton’s actions after November 8. “I have a suspicion...

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.